DEF CON Workshops Table

Longer, more detailed, hands on, lasting half a day.
These have limited seating. These will fill up VERY quickly!

One Page All Workshops list with descriptions

defcon.org Workshops page

You may need to scroll to the right to see all info

64-bit Intel Assembly Language Programming for Hackers
Workshop Info
Accelerating Malware Analysis with WinDbg Time Travel Debugging
Workshop Info
Advanced Ghidra Scripting & Automation
Workshop Info
Analyzing and Creating Windows Shellcode for Hackers
Workshop Info
Cloud Forensics Workshop: Smart Grid Edition
Workshop Info
Contextualizing alerts with relevant logs and events without queries or LLMs
Workshop Info
Creating malicious functional app on Android
Workshop Info
Deep-dive into modern network fingerprinting
Workshop Info
Defeating Malware Evasion: Techniques and Countermeasures
Workshop Info
Disrupting Digital Dataflows: A 101 on how 2 detect, analyze, & disrupt digital systems by reverse engineering real-world Electronic Warfare techniques from Ukraine at the hardware level
Workshop Info
Dive into Windows Library Loading
Workshop Info
DIY Malware Emulation: Build It, Break It, Detect It
Workshop Info
Effectively Detecting Modern Malware with Volatility 3
Workshop Info
Eliminating Bug Classes at Scale: Leveraging Browser Features for Proactive Defense
Workshop Info
EMMC BGA Secrets, hack bga memory, no reballing necessary: Learn how to safely remove EMMC memory modules, hack them and then reinstall, without the difficult process of trying to reball the BGA.
Workshop Info
Fine Tune your personal LLM assistant to Secure coding
Workshop Info
Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems
Workshop Info
From Prompt to Protection: A Practical Guide to Building and Securing Generative AI Applications
Workshop Info
Hacker VPN
Workshop Info
Hacking the connected plant: AI edition!
Workshop Info
Hacking The Metal: Into the GPU
Workshop Info
Hands-on IoT firmware extraction and flash forensics
Workshop Info
Hands-on Kubernetes Attack & Defense Masterclass
Workshop Info
Hands-On Threat Hunting with Wireshark
Workshop Info
Inside the Threat: Designing and Deploying Malicious Browser Extensions to Understand Their Risk
Workshop Info
Introduction to Cryptographic Attacks
Workshop Info
K8sploitation: Hacking Kubernetes the Fun Way
Workshop Info
Learning to Hack Bluetooth Low Energy with BLE CTF
Workshop Info
Medical Device Hacking: 201
Workshop Info
Obfuscation Reloaded: Modern Techniques for Evading Detection
Workshop Info
Open Source Malware 101 – Everything you always wanted to know about npm malware (and more)
Workshop Info
Pen-testing Cloud REST APIs
Workshop Info
PLC Playground: Hands-On Industrial Control Systems Attacks
Workshop Info
Practical YARA: Crafting Custom Rules for Targeted Malware Defense
Workshop Info
Provably exfiltrating data by breaking TLS in the right ways
Workshop Info
Putting EDRs in Their Place: Killing and Silencing EDR Agents
Workshop Info
Reach the Nirvana
Workshop Info
SnowGoat: Exposing Hidden Security Risks and Leaking Data Like a Threat Actor
Workshop Info
Whitebox Web Exploit Dev (WWED)
Workshop Info
Wi-Fi-So-Serious
Workshop Info